Security in Computing and Communications: 7th International Symposium, Sscc 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers » książka
Malware Detection in Android Applications Using Integrated Static Features.- Intrusion Prediction and Detection with Deep Sequence Modeling.- Secure Authentication Using One Time Contextual QR Code.- A Proximity-based Measure for Quantifying the Risk of Vulnerabilities.- Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions.- Detection and Analysis of Drive-by-Downloads and Malicious Websites.- Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study.- A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation.- Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment.- Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey.- Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream.- Improving Sentiment Analysis of Arabic Tweets.- Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity.- Towards a Privacy Web Scanner for End-Users.- Security of Quantum Cryptography.- The Impact of a Security Model in a Fog Computing Environment.- GOTCHA-I: A Multiview Human Videos Dataset.- Enhancing Enterprise IT Security with a Visualization-based Process Framework.- Pipelined Implementation of Millar Rabin Primality Tester Using Altera FPGA Kit.- Realization of Re-Configurable True Random Number Generator on FPGA.- Secret Image Sharing Scheme for Gray-level Images Using Toeplitz Matrix Based Stream Cipher.- On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics.- Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process.- Exploitation of HTTP/2 Proxies for Cryptojacking.- Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks.- Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage.- Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective.- Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification.- Braille Based Steganography System Using Dynamic Key Exchange.